Ownership and Disposition of Customer Owned Data, Hosting Location Sample Clauses

Ownership and Disposition of Customer Owned Data, Hosting Location. “Customer Data” refers to the data provided by the Customer that resides in the Customer’s Avolve SAAS Solution environment, including any plan review, project drawings and associated project documents. Customer shall own all Customer Data that may reside within Contractor’s hosting environment, to include Disaster recovery site, equipment and media. Contractor is granted no rights hereunder to use the Customer Data except to the extent necessary to fulfill its obligations to Customer under this Agreement. Unless approved in writing by Customer, Avolve shall host the Avolve SAAS Solution provided to Customer hereunder from a data center located within the United States. Upon termination or expiration of Customer’s right to use the Avolve SAAS Solution for any reason other than Customer’s uncured material breach, for the first thirty (30) calendar days following termination or expiration, Customer may request in writing that Avolve provide an copy of Customer's then-current Customer Data and, for no additional cost, Avolve shall provide a copy in a mutually agreed upon format on media supplied by the Customer. If the parties are unable to mutually agree upon the format or the media supplied by Customer is not acceptable to Avolve, Avolve will use commercially reasonable efforts to still provide a copy of the Customer Data but Avolve may charge a reasonable professional services fee for increased costs incurred. After this time period has expired, Avolve has no further obligation to retain the Customer Data and shall use commercially reasonable efforts to promptly delete all Customer Data from the Avolve SAAS Solution.
AutoNDA by SimpleDocs

Related to Ownership and Disposition of Customer Owned Data, Hosting Location

  • Ownership and Location of Metering Equipment The Metering Equipment to be constructed, the capability of the Metering Equipment to be constructed, and the ownership thereof, are identified on the attached Schedule C to this ISA.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Permitted Uses and Disclosures by Business Associate 1. Business Associate may only use or disclose protected health information as necessary to perform the services as outlined in the underlying agreement.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Transfer or Deletion of Student Data The Provider shall review, on an annual basis, whether the Student Data it has received pursuant to the DPA continues to be needed for the purpose(s) of the Service Agreement and this DPA. If any of the Student Data is no longer needed for purposes of the Service Agreement and this DPA, the Provider will provide written notice to the LEA as to what Student Data is no longer needed. The Provider will delete or transfer Student Data in readable form to the LEA, as directed by the LEA (which may be effectuated through Exhibit D of the DPA), within 30 calendar days if the LEA requests deletion or transfer of the Student Data and shall provide written confirmation to the LEA of such deletion or transfer. Upon termination of the Service Agreement between the Provider and LEA, Provider shall conduct a final review of Student Data within 60 calendar days. If the LEA receives a request from a parent, as that term is defined in 105 ILCS 10/2(g), that Student Data being held by the Provider be deleted, the LEA shall determine whether the requested deletion would violate State and/or federal records laws. In the event such deletion would not violate State or federal records laws, the LEA shall forward the request for deletion to the Provider. The Provider shall comply with the request and delete the Student Data within a reasonable time period after receiving the request. Any provision of Student Data to the LEA from the Provider shall be transmitted in a format readable by the LEA.

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Vendor certifies that Vendor is not a company identified on the Texas Comptroller’s list of companies known to have contracts with, or provide supplies or services to, a foreign organization designated as a Foreign Terrorist Organization by the U.S. Secretary of State. Does Vendor certify? 3 Yes

  • Permitted License Uses and Restrictions (a) This Order Form Supplement allows you, as an authorized User under the Master Subscription Agreement, to use the Software on any Supported Device and on no other devices.

  • Permitted Uses and Disclosures of PHI 2.1 Unless otherwise limited herein, Business Associate may:

Time is Money Join Law Insider Premium to draft better contracts faster.